Which of the following is a block cipher?
A) Blow fish
B) AES
C) IDEA
D) All of the above
D) All of the above
You might also like to view...
The UNIX editor vi allows searching in both directions, with wrap around if necessary. If the sequence of lines is stored as a linked list, which of the following is most reasonable?
a. singly linked list b. doubly linked list c. circular singly linked list d. circular doubly linked list e. none of the above
____ is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues, and business risks.
A. ISO/IEC 27001 B. ISO/IEC 27002 C. COBIT D. ISACA
In the Gallery, you can mouse over a piece of clip art to view its description and name in a(n) ________
A) ScreenTip B) separate document C) clip art field D) illustration pane
____________________ is the process of identifying risk, as represented by vulnerabilities, to an organization's information assets and infrastructure, and taking steps to reduce this risk to an acceptable level.
Fill in the blank(s) with the appropriate word(s).